搜索结果: 1-4 共查到“军事学 bounded storage model”相关记录4条 . 查询时间(0.104 秒)
Simple Schemes in the Bounded Storage Model
Bounded Storage Model Commitment Oblivious Transfer
2019/5/21
The bounded storage model promises unconditional security proofs against computationally unbounded adversaries, so long as the adversary’s space is bounded. In this work, we develop simple new constru...
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Bounded storage model error correction commitment oblivious transfer
2015/12/22
In the bounded storage model the memory of the adversary is restricted, instead of its
computational power. With this different restriction it is possible to design protocols with
information-theore...
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
extractors bounded storage model everlasting security
2009/4/15
We consider the problem of constructing randomness extractors which are locally computable,
i.e. only read a small number of bits from their input. As recently shown by Lu (CRYPTO
‘02 ), locally com...
Intrusion-Resilience via the Bounded-Storage Model
Intrusion-Resilience Bounded-Storage Model cryptographic protocol
2009/2/12
We introduce a new method of achieving intrusion-resilience
in the cryptographic protocols. More precisely we show how to preserve
security of such protocols, even if a malicious program (e.g. a vir...